[64879] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Hijacked IP space.

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Tue Nov 4 05:25:10 2003

Date: Tue, 04 Nov 2003 05:24:16 -0500
From: Suresh Ramasubramanian <suresh@outblaze.com>
To: Jamie Reid <Jamie.Reid@mbs.gov.on.ca>
Cc: chucklist@forest.net, nanog@merit.edu
In-Reply-To: <sfa7129e.064@imail.mbs.gov.on.ca>
Errors-To: owner-nanog-outgoing@merit.edu


Jamie Reid writes on 11/4/2003 12:54 AM:

> Are they taking advantage of sloppy redistribution configurations, 0wning
> routers, spoofing OSPF updates,  taking advantage of default static
> routes, or is there something more complicated at work? 

Sometimes as simple as social engineering - a company goes out of 
business, but still has a /16 allocated to it.  So what happens is that 
some fake letterheads get typed up (and possibly the company name 
re-registered "under new management), and a request for routing these 
blocks goes out ...

Then you get (say) a T1 from some random ISP, and then get them to 
announce the /16.

	srs

-- 
srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9
manager, outblaze.com security and antispam operations

home help back first fref pref prev next nref lref last post